General

  • Target

    3d269fa795ef692e9f284f20326fe5827e25c82762b42a8813e5a79bcd013908

  • Size

    450KB

  • Sample

    211028-zmdkxaghgr

  • MD5

    13a431077c71148993ef6be2f628f5e8

  • SHA1

    a4c070e7a96d144454c121b8da18392f0e67ff75

  • SHA256

    3d269fa795ef692e9f284f20326fe5827e25c82762b42a8813e5a79bcd013908

  • SHA512

    7ca00106d54ef1f1c6359d74408967ac25117490b9686f0e025fd847a7227ef4ca2ad100dd46f3514e73d4cc7b0aca0ec081433c0853f2ef1288d4d43b7fc820

Malware Config

Extracted

Family

raccoon

Botnet

60e59be328fbd2ebac1839ea99411dccb00a6f49

Attributes
  • url4cnc

    http://telegin.top/agrybirdsgamerept

    http://ttmirror.top/agrybirdsgamerept

    http://teletele.top/agrybirdsgamerept

    http://telegalive.top/agrybirdsgamerept

    http://toptelete.top/agrybirdsgamerept

    http://telegraf.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

    • Target

      3d269fa795ef692e9f284f20326fe5827e25c82762b42a8813e5a79bcd013908

    • Size

      450KB

    • MD5

      13a431077c71148993ef6be2f628f5e8

    • SHA1

      a4c070e7a96d144454c121b8da18392f0e67ff75

    • SHA256

      3d269fa795ef692e9f284f20326fe5827e25c82762b42a8813e5a79bcd013908

    • SHA512

      7ca00106d54ef1f1c6359d74408967ac25117490b9686f0e025fd847a7227ef4ca2ad100dd46f3514e73d4cc7b0aca0ec081433c0853f2ef1288d4d43b7fc820

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks